Cloud

Part 2 of 8 in the series Immersion

Concentrating on one course of instruction, subject, or project to the exclusion of all others for several days or weeks; intensive — dictionary.com

 

“Immediately following the devastating 9/11 attacks, many Americans willingly ceded their rights and liberties to government officials who promised them that the feeling of absolute safety could be restored,” writes John W. Whitehead for The Huffington Post:

Even with our freedoms in shambles, our country in debt, our so-called “justice” system weighted in favor of corporations and the police state, our government officials dancing to the tune of corporate oligarchs, and a growing intolerance on the part of the government for anyone who challenges the status quo, Americans have yet to say “enough is enough.”…

Now, in the wake of the Boston Marathon bombing, we are once again being assured that if we only give up a few more liberties and what little remains of our privacy, we will be a free, safe society. The reality of life in America tells a different tale, however. For example, in a May 2013 interview with CNN, former FBI counterterrorism agent Tim Clemente disclosed that the federal government is keeping track of all digital communications that occur within the United States, whether or not those communicating are American citizens, and whether or not they have a warrant to do so.…

In other words, there is no form of digital communication that the government cannot and does not monitor – phone calls, emails, text messages, tweets, Facebook posts, Internet video chats, etc., are all accessible, trackable and downloadable by federal agents.1, i

Top 500 passwords

“If wiretapping is strongly justified in individual cases, then, argues the F.B.I, as communication technologies change, so, too, must those laws and regulations,” notes Tim Wu for The New Yorker:

Hence, as new technologies emerge, or as existing ones become harder to tap, the wiretapping power needs to be adjusted to maintain roughly the same balance. This essential concept of balance is what’s behind the F.B.I’s argument that it needs more power lest its ability to wiretap “go dark.”…

But there are two essential conditions for this balance argument to make any sense. First, if it is to have more powers, the Justice Department should also agree that Web communications and stored records are generally subject to the strict standards demanded by the Fourth Amendment (as are the content of telephone calls). As it stands, the Justice Department has been evasive on this point. It has argued against the need for warrants for things like e-mail messages, and often appears to believe that a mere subpoena (a document issued by a prosecutor) should be sufficient to obtain any record stored on the Web or otherwise.…

The second condition needed for the F.B.I.’s balance argument to work is the limitation of highly intrusive monitoring to cases of serious crimes with clear victims. Federal law is chock-full of offenses, which make everyone a potential criminal and, in turn, at least potentially subject to tapping.…

The whole idea of balance in this area must also be put in the context of a growing “surveillance state,” as Hendrik Hertzberg calls it. As intense as F.B.I. surveillance can be, at least the F.B.I. regards the Constitution as a serious constraint, unlike the National Security Agency, which has repeatedly spied on Americans without a warrant, reaching its maximum level of abuse during the Bush years. That doesn’t mean we should be thankful, exactly, for F.B.I. monitoring, but let’s just say things could be worse.…

“Courts, especially the Sixth Circuit Court of Appeals, are ahead of the Justice Department in their recognition that the data we all store on the Internet nowadays has become core to American privacy,” writes Tim Wu for The New Yorker.2

Craig Timberg and Ellen Nakashima report the use of malware for surveillance:

The FBI has been able to covertly activate a computer’s camera – without triggering the light that lets users know it is – for several years, and has used that technique mainly in terrorism cases or the most serious criminal investigations, said Marcus Thomas, former assistant director of the FBI’s Operational Technology Division in Quantico, now on the advisory board of Subsentio, a firm that helps telecommunications carriers comply with federal wiretap statutes.3

In May 2013, RT.com noted that “The US government has been running a quantum Internet for over two years.”

The Tech Review blog announced on Monday [6 May 2013] that Richard Hughes and a team of researchers at Los Alamos National Labs in New Mexico have been running an “alternative quantum Internet,” and have been doing so for roughly two-and-a-half years. In a blog post the website broke down the basics of how Hughes and company created a system that works like a hub-and-spoke network in which all messages anywhere in the network get routed from a main node – a central hub.

“The idea is that messages to the hub rely on the usual level of quantum security. However, once at the hub, they are converted to conventional classical bits and then reconverted into quantum bits to be sent on the second leg of their journey,” announced the blog. “So as long as the hub is secure, then the network should also be secure.”

It’s a perfectly secure Internet that by definition cannot be penetrated by wiretaps and eavesdropping – and the US government has been sitting on it for the last two-and-a-half years.4


Notes

i “As we all know, the United States is the real ‘hacking empire’ and has an extensive espionage network,” the state-run Chinese newspaper People’s Daily said.
– Chen Weihua, “Accusations fly over ‘spy nets’,” China Daily, 10-12 May 2013, p. 1.

Sources

1 John W. Whitehead, “‘Round the Clock Surveillance: Is This the Price of Living in a ‘Free, Safe’ Society?” The Huffington Post, 14 May 2013, at http://www.huffingtonpost.com/john-w-whitehead/round-the-clock-surveilla_b_3267214.html (retrieved: 16 May 2013).

2 Tim Wu, “Wiretapping the Web,” The New Yorker, 14 May 2013, at http://www.newyorker.com/online/blogs/elements/2013/05/wiretapping-the-web.html (retrieved: 14 May 2013).

3 Craig Timberg and Ellen Nakashima, “FBI’s search for ‘Mo,’ suspect in bomb threats, highlights use of malware for surveillance,” The Washington Post, 6 December 2013, at http://www.washingtonpost.com/business/technology/fbis-search-for-mo-suspect-in-bomb-threats-highlights-use-of-malware-for-surveillance/2013/12/06/352ba174-5397-11e3-9e2c-e1d01116fd98_print.html (retrieved: 9 December 2013).

4 “The US government has been running a quantum Internet for over two years,” RT.com, 6 May 2013, at http://rt.com/usa/alamos-secure-internet-quantum-902/ (retrieved: 17 May 2013).

See also

Mark Burnett, “10,000 Top Passwords, Xato.net, 20 June 2011, at https://xato.net/passwords/more-top-worst-passwords/ (retrieved: 10 December 2013).

Leave a Reply


Amazon gift card



Operation Underground Railroad - We rescue kidnapped children from slavery
 Operation Underground Railroad - We rescue kidnapped children from slavery OurRescue.org 

This material contains copyrighted material whose use has not been specifically authorized by the copyright owner. SkewsMe.com is making it available without profit to viewers who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of human rights, civil liberties, and social justice, for non-profit research and educational purposes only. We believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner.

This page is subject to change as new facts arise.

sitemap

Tinfoil Hat - Mind Control and Coercive Psychological Systems by Kevin J. Crosby - Skews.Me - SkewsMe.com Stop censorship